Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1247729141.4227.6.camel@localhost>
Date: Thu, 16 Jul 2009 09:25:41 +0200
From: Alex Legler <a3li@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: XEmacs Multiple Integer Overflows

Hi,

I don't think we have a CVE for this/these issue(s) yet, so please
assign one/some:

The {tiff,png,jpeg}_instantiate() functions in glyphs-eimage.c contain
an integer overflow, possibly leading to a heap-based buffer overflow.

References:
Filed upstream as: http://tracker.xemacs.org/XEmacs/its/issue534

http://secunia.com/advisories/35348
http://www.vupen.com/english/advisories/2009/1666
https://bugs.gentoo.org/show_bug.cgi?id=275397
https://bugzilla.redhat.com/show_bug.cgi?id=511994

Thanks,
Alex

Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.